Giorgio Maone wrote:The CIDR one, i.e.
Code: Select all
Site 208.117.224.0/19
Allow from 208.117.224.0/19
Deny
Ah good

Thanks!
Out of curiousity, what does the /19 stand for? :19 would be port 19 but I don't know about slashes.
Giorgio Maone wrote:But maybe I'm missing something, why not just
Code: Select all
Site *.youtube.com youtube.com *.ytimg.com ytimg.com
Allow from *.youtube.com youtube.com *.ytimg.com ytimg.com
Deny
?
Because sometimes I agree to load youtube from elsewhere, Google Maps for instance as it's the same company. It seems that
sometimes, the embedded youtube Flash video needs a connection to one of these IPs in the range given by the whois above.
(Although NoScript doesn't
always show it in Tools >> Error console...or does it? All I remember is that sometimes I had to use RequestPolicy to see what ABE was blocking precisely, usually crossdomain.xml files and external SWF. I was using pretty restrictive ABE rules in those tests though)
Giorgio Maone wrote:TestingABE wrote:And better yet, does or will NoScript allow the direct use of server names (in this case, DNS1.SJL.YOUTUBE.COM) in ABE rulesets?
I'm not sure about what you mean. ABE has always allowed using
host names (e.g. youtube.com), which DNS servers translate into IPs (e.g. 208.117.224.1)...
I was supposing that dns1 and dns2.sjl.youtube.com would be the right places to target, that they would translate to all IPs in the range. Looks like I was wrong and that it was 208.117.224.0/19 instead.

By "better yet", I meant that because dns1.sjl.youtube.com is a host name, I hoped that it would point to all IPs in youtube's registered range
no matter whether this range gets modified or not in the future. Can CIDRs like 208.117.224.0/19 do that? If so it means that
maybe my Firewall will finally be able to allow svchost to communicate with Windows Update without having to write TONS of IPs in the rule! Now to find the right CIDRs...
Thank you for the help!

Mozilla/5.0 (Windows; U; Windows NT 6.0; fr; rv:1.9.1.1) Gecko/20090715 Firefox/3.5.1